CVE-2024-11981 (GCVE-0-2024-11981)
Vulnerability from cvelistv5 – Published: 2024-11-29 06:21 – Updated: 2024-11-29 14:31
VLAI?
Summary
Certain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages.
Severity ?
7.5 (High)
CWE
- CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Billion Electric | M100 |
Affected:
1.04.1.592.* , < 1.04.1.592.8
(custom)
Affected: 1.04.1.613.* , < 1.04.1.613.13 (custom) Affected: 1.04.1.* , < 1.04.1.675 (custom) |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:billion_electric:m100:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m100",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:billion_electric:m150:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m150",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:billion_electric:m120n:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m120n",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:billion_electric:m500:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "m500",
"vendor": "billion_electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.* \u003c",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-11981",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-29T14:25:30.745734Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-29T14:31:52.528Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "M100",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M150",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M120N",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M500",
"vendor": "Billion Electric",
"versions": [
{
"lessThan": "1.04.1.592.8",
"status": "affected",
"version": "1.04.1.592.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.613.13",
"status": "affected",
"version": "1.04.1.613.*",
"versionType": "custom"
},
{
"lessThan": "1.04.1.675",
"status": "affected",
"version": "1.04.1.*",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-11-29T06:16:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCertain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages.\u003c/span\u003e"
}
],
"value": "Certain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages."
}
],
"impacts": [
{
"capecId": "CAPEC-37",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-37 Retrieve Embedded Sensitive Data"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-29T06:29:10.735Z",
"orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"shortName": "twcert"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://www.twcert.org.tw/tw/cp-132-8275-50f42-1.html"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.twcert.org.tw/en/cp-139-8276-1defb-2.html"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\u003cbr\u003eFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\u003cbr\u003eFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later.\u003cbr\u003e"
}
],
"value": "For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\nFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\nFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later."
}
],
"source": {
"advisory": "TVN-202411026",
"discovery": "EXTERNAL"
},
"title": "Billion Electric router - Authentication Bypass",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e",
"assignerShortName": "twcert",
"cveId": "CVE-2024-11981",
"datePublished": "2024-11-29T06:21:31.476Z",
"dateReserved": "2024-11-29T01:52:19.267Z",
"dateUpdated": "2024-11-29T14:31:52.528Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Certain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages.\"}, {\"lang\": \"es\", \"value\": \"Ciertos modelos de enrutadores de Billion Electric tienen una vulnerabilidad de omisi\\u00f3n de autenticaci\\u00f3n, lo que permite a atacantes no autenticados recuperar contenidos de p\\u00e1ginas web arbitrarias.\"}]",
"id": "CVE-2024-11981",
"lastModified": "2024-11-29T07:15:05.760",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"twcert@cert.org.tw\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-11-29T07:15:05.760",
"references": "[{\"url\": \"https://www.twcert.org.tw/en/cp-139-8276-1defb-2.html\", \"source\": \"twcert@cert.org.tw\"}, {\"url\": \"https://www.twcert.org.tw/tw/cp-132-8275-50f42-1.html\", \"source\": \"twcert@cert.org.tw\"}]",
"sourceIdentifier": "twcert@cert.org.tw",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"twcert@cert.org.tw\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-288\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-11981\",\"sourceIdentifier\":\"twcert@cert.org.tw\",\"published\":\"2024-11-29T07:15:05.760\",\"lastModified\":\"2024-11-29T07:15:05.760\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages.\"},{\"lang\":\"es\",\"value\":\"Ciertos modelos de enrutadores de Billion Electric tienen una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n, lo que permite a atacantes no autenticados recuperar contenidos de p\u00e1ginas web arbitrarias.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"twcert@cert.org.tw\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-288\"}]}],\"references\":[{\"url\":\"https://www.twcert.org.tw/en/cp-139-8276-1defb-2.html\",\"source\":\"twcert@cert.org.tw\"},{\"url\":\"https://www.twcert.org.tw/tw/cp-132-8275-50f42-1.html\",\"source\":\"twcert@cert.org.tw\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-11981\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-29T14:25:30.745734Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:billion_electric:m100:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m100\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:billion_electric:m150:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m150\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:billion_electric:m120n:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m120n\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:billion_electric:m500:*:*:*:*:*:*:*:*\"], \"vendor\": \"billion_electric\", \"product\": \"m500\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.* \u003c\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-29T14:31:41.458Z\"}}], \"cna\": {\"title\": \"Billion Electric router - Authentication Bypass\", \"source\": {\"advisory\": \"TVN-202411026\", \"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-37\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-37 Retrieve Embedded Sensitive Data\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Billion Electric\", \"product\": \"M100\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Billion Electric\", \"product\": \"M150\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Billion Electric\", \"product\": \"M120N\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Billion Electric\", \"product\": \"M500\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.04.1.592.*\", \"lessThan\": \"1.04.1.592.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.613.*\", \"lessThan\": \"1.04.1.613.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.04.1.*\", \"lessThan\": \"1.04.1.675\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\\nFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\\nFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"For firmware version 1.04.1.592.x, please update to 1.04.1.592.8 or later.\u003cbr\u003eFor firmware version 1.04.1.613.x, please update to 1.04.1.613.13 or later.\u003cbr\u003eFor all other firmware version 1.04.1.x, please update to 1.04.1.675 or later.\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2024-11-29T06:16:00.000Z\", \"references\": [{\"url\": \"https://www.twcert.org.tw/tw/cp-132-8275-50f42-1.html\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://www.twcert.org.tw/en/cp-139-8276-1defb-2.html\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCertain models of routers from Billion Electric has an Authentication Bypass vulnerability, allowing unautheticated attackers to retrive contents of arbitrary web pages.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-288\", \"description\": \"CWE-288 Authentication Bypass Using an Alternate Path or Channel\"}]}], \"providerMetadata\": {\"orgId\": \"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e\", \"shortName\": \"twcert\", \"dateUpdated\": \"2024-11-29T06:29:10.735Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-11981\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-29T14:31:52.528Z\", \"dateReserved\": \"2024-11-29T01:52:19.267Z\", \"assignerOrgId\": \"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e\", \"datePublished\": \"2024-11-29T06:21:31.476Z\", \"assignerShortName\": \"twcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…